Network-level performance evaluation of a tworelay cooperative random access wireless system

Size: px
Start display at page:

Download "Network-level performance evaluation of a tworelay cooperative random access wireless system"

Transcription

1 Network-level performance evaluation of a tworelay cooperative random access wireless system Georgios Papadimitriou, Nikolaos Pappas, Apostolos Traganitis and Vangelis Angelakis Linköping University Post Print N.B.: When citing this work, cite the original article. Original Publication: Georgios Papadimitriou, Nikolaos Pappas, Apostolos Traganitis and Vangelis Angelakis, Network-level performance evaluation of a two-relay cooperative random access wireless system, 215, Computer Networks, (88), Copyright: Elsevier Postprint available at: Linköping University Electronic Press

2 Network-Level Performance Evaluation of a Two-Relay Cooperative Random Access Wireless System Georgios Papadimitriou, Nikolaos Pappas, Apostolos Traganitis, Vangelis Angelakis 1 Abstract In wireless networks relay nodes can be used to assist the users transmissions to reach their destination. Work on relay cooperation, from a physical layer perspective, has up to now yielded well-known results. This paper takes a different stance focusing on network-level cooperation. Extending previous results for a single relay, we investigate here the benefits from the deployment of a second one. We assume that the two relays do not generate packets of their own and the system employs random access to the medium; we further consider slotted time and that the users have saturated queues. We obtain analytical expressions for the arrival and service rates of the queues of the two relays and the stability conditions. We investigate a model of the system, in which the users are divided into clusters, each being served by one relay, and show its advantages in terms of aggregate and throughput per user. We quantify the above, analytically for the case of the collision channel and through simulations for the case of Multi-Packet Reception (MPR), and we provide insight on when the deployment of a second relay in the system can yield significant advantages. I. INTRODUCTION Cooperative communications have gained significant attention lately. Cooperation can take place in difference communication layers, with the bulk of interest focusing on physical layer performance [2], [3]. In that level, cooperation benefits are self-evident, since the explored systems typically belong to a single actor with interest to maximize a specific utility [4]. Promoting cooperation at higher layers, has also drawn significant attention due to the potential benefits from operators and users. Focusing on the purely network layer the benefits of utilizing cooperative techniques have been recently shown to be multi-fold, with respect to system performance in terms of throughput [5] [1], reliability [11] and delay [8]. In that regard the use of dedicated relays has been introduced in may practical systems, such as wi-fi (known as range extenders) and in LTE. A. Related Work The notion of cooperative communications was introduced by information theory with the relay channel. The relay channel is the basic building block for the implementation of cooperative communications, which are widely acknowledged to provide higher communication rates and reliability in a wireless network with time varying channels [3]. It was initially proposed by van der Meulen [12], and its first information-theoretic characterizations were presented in [13]. Recently, the study of the relay channel has gained significant interest in the wireless communications community. In [14] for the classic relay channel a protocol is presented for selection of reception and transmission time slots adaptively and based on the quality of the involved links. Considering full-duplex and half-duplex relaying [15] shows that if the numbers of antennas at source and destination are equal to or larger than the number of antennas at the relay, half-duplex relaying can achieve in some cases higher throughput than ideal full-duplex relaying. With beamforming and taking inter-relay interference [16] proposes two buffer-aided relay selection schemes. G. Papadimitriou is with Ericsson, Stockholm, Sweden ( georgios.papadimitriou@ericsson.com). N. Pappas and V. Angelakis are with the Department of Science and Technology, Linköping University, Norrköping SE-6174, Sweden ( {nikolaos.pappas, vangelis.angelakis}@liu.se). A. Traganitis is with the Computer Science Department, University of Crete, Greece and the Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH) ( tragani@ics.forth.gr). This work was presented in part in IEEE ICC 213 [1]. The research leading to these results has received funding from the People Programme (Marie Curie Actions) of the European Union s Seventh Framework Programme FP7/27-213/ under REA grant agreements n o [324515] (MESH-WISE) and n o [612361] (SOrBet).

3 2 Interference cancellation is employed in [17] to allow opportunistic relaying selection maximising the average capacity of the network. For a practical system, OFDMA based cellular resource allocation schemes are proposed in [18] for multiple relay stations (RS) with adaptive RS activation. As mentioned, the majority of the works in this area focus on potential gains by cooperation on the physical layer. Recent works [5] and [6] suggest that similar gains can be achieved by network-layer cooperation. By network-layer cooperation they consider relaying to be taking place at a protocol level avoiding physical layer considerations. Random multiple access schemes in these works use the collision channel model with erasures, where concurrent transmissions will fail [6], [19], [2]. The collision channel however is not the appropriate model for wireless networks. Random access with Multi-Packet Reception (MPR) capabilities has attracted attention recently [21] [24]. The seminal paper [21] was the first to examine MPR as an interaction between the physical and medium access control layers for a wireless random access network. In [22], the notion of MPR was introduced and two important theorems for the slotted ALOHA network with MPR are provided. They consider the effect of MPR on stability and delay of slotted Aloha based random-access system and it is shown that the stability region undergoes a phase transition from a concave region to a convex polyhedral region as the MPR capability improves in a two-user system. In [23], the authors specify a general asymmetric MPR model and the medium access control capacity region. In [24], the impact of a relay node to a network with a finite number of users-sources and a destination node is investigated. In this network the relay and the destination nodes have MPR capabilities. Analytical expressions for the characteristics of the relay node queue such as average queue length, stability conditions etc. were obtained. Finally, an overview of MPR-related research work covering the theoretically proved impacts and advantages of using MPR from a channel perspective to network capacity and throughput, the various technologies that enable MPR from transmitter, transceiver, and receiver perspectives and previous work on protocol improvement to better exploit MPR, is provided in [25]. B. Contribution In this work, we provide a thorough study of the impact of using two relay nodes in a network to assist with relaying packets from a number of users to a destination node. We first investigate the system analytically, assuming the collision channel; then we move to assume that the system is MPR enabled and we conduct a thorough, systemlevel simulation study. Our common assumptions in both models are that (i) users have saturated queues and random access to the medium with slotted time 1 ; (ii) the transmission of a packet takes the duration of exactly one time slot; (iii) the two relays are dedicated, i.e. do not have packets of their own, but assist the users by relaying their packets when necessary; (iv) the wireless link between any two nodes of the network is a Rayleigh narrowband flat-fading channel with additive Gaussian noise. In the first part, we obtain analytical expressions for the arrival and service rates of the queues of the two relays, and for the stability conditions. In doing so we use the stochastic dominance technique [28] because the two queues are coupled (i.e., the service process of each queue depends on the other queue having a packet to send or not). We also look into a topology of the system in which the users are divided into two clusters. In this scenario, we consider that the users of one cluster do not interfere with the users or the relay of the other cluster, still, the relays are interfering with each other. This corresponds to the case of having the users in two distant areas. However, since the location of the users is captured by the link success probability, this scenario can cover any similar case, in which a system practitioner could leverage sophisticated clustering techniques to approach our results, even in an on-line fashion. In general, clustering can deliver results depending on the topology of the users [29]. For both scenarios (with and without clustering) we study the impact of the two relay nodes of the two cases on the aggregate throughput and the throughput per user when the queues of the two relays are stable. We show that the probabilities of the two relays to attempt transmission do not depend on each other when the queues are stable. The insertion of the second relay offers a significant performance gain (higher throughput) when the users are divided into clusters and each cluster is assigned to one relay, though in the general un-clustered scenario the gains are not as significant. 1 Dealing with analytical performance evaluation of random access systems above three users with random arrivals is mathematically intractable. Specifically, assuming the sources saturated, the so-called saturated throughput can be obtained and is an inner bound of the stable throughput [26], [27].

4 3 Under the MPR model, the transmission of a node j is successful if the received Signal to Interference plus Noise Ratio (SINR) is above a threshold γ j. Here, due to queue coupling the stability analysis and the derivation of analytical expressions for the characteristics of the relays queues such as arrival and service rates, are not tractable. We therefore conduct extensive simulations to provide a comprehensive insight into the performance of the tworelay system. We show that the use of two relays offers significant advantage in terms of aggregate and throughput per user compared to systems with one and no relay, for values of SINR threshold γ > 1. Under the clustering scenario employed in the first part we study the impact on the aggregate and throughput per user compared to the cases of no relay, one relay and two variations of two relay nodes operation: a packet received by both relays is either kept by (i) both nodes or (ii) by the one with the smallest queue of the two. Finally, we provide insight for the average queue size and the average delay per packet of the systems presented. The paper is structured as follows: in Section II we describe the system model. In Section III we derive the analytical expressions for: (A) the arrival and service rate of the relays queues, (B) the stability conditions of the queues, (C) the stability region and (D) the throughput per user along with the upper and lower bounds. In Section IV we present the numerical and simulation study of the analytically obtained results of Section III, while in section V we conduct a thorough simulation study for the MPR model. We give our conclusions in Section VI. A. Network Model II. SYSTEM MODEL We consider a network with N source users, two relay nodes R 1 and R 2 and a common destination node d, a case for N = 2 is depicted in Fig. 1. The sources transmit packets to the destination with the cooperation of the two relays. We assume that the queues of the users are saturated. The users have random access to the medium with no coordination among them. The channel is slotted in time and the transmission of a packet takes the duration of exactly one time slot. We assume fixed packet size, which could be viewed as an average packet size, since taking into account variable packet sizes would severely complicate the analysis. The acknowledgements (ACKs) of successful transmissions are instantaneous and error free. With this set of assumptions, and especially random access of the medium, a host of system parameters that could be available, such as channel state information for the links is not required nor considered in our work. The relays do not generate packets of their own. If a transmission of a user s packet to the destination fails, the relays store it in their queues and try to forward it to the destination at a subsequent time slot. In case that both relays receive the same packet from a user, they choose randomly and with equal probability which will store it in its queue. The queues at the relays have infinite size. In this work we consider two cases for the relays and the destination, either that they are equipped with single transceivers thus, a simultaneous transmission attempts by two or more nodes (source-users or relays) result in a collision, or that they are equipped with multiuser detectors, so that they may decode packets successfully from more than one transmitter at a time. The specifics for these are given in the following section. The notation we consider throughout this paper is the following: The users attempt to transmit with probabilities q i, where i = 1, 2,..., N. Each of the relays, having not saturated queues, attempts to transmit with probability q Rj, j = 1, 2 if its queue is not empty. Thus probability that a relay will transmit a packet at a time slot t is q Ri Pr(Q t R i > ), where i = 1, 2 and Q t R i indicates the size of the queue at time slot t. B. Physical Layer Model 1) Collision Channel: We model the link between two nodes i and j of the network as a Rayleigh narrowband flat-fading channel with additive Gaussian noise. The outage probability of that link with SNR threshold γ j is known [3] to be Pr(SNR ij < γ j ) = 1 exp( γ j n j r α ij /P tx(i)) where P tx (i) is the transmission power of node i, r ij is the distance between nodes i and j, α is the path loss exponent and n j is the power of the additive white Gaussian noise at j. So, by p ij we denote the success probability of a transmission between nodes i and j, which is p ij = exp( γ j n j r α ij /P tx(i)). The average service rate seen by the relay R 1 is µ R1 = q R1 p R1d [1 q R2 Pr(Q R2 > )] N (1 q i ). (1)

5 4 Fig. 1: Two relay nodes with N = 2 user nodes. Because of the collision channel, all the users should remain silent, which is with probability N (1 q i), also the relay R 2 should remain silent, with probability 1 q R2 Pr(Q R2 > ). Furthermore, relay R 1 has to be active, with probability q R1 and the transmission to the destination successful with probability p R1d. Similarly, the average service rate seen by relay R 2 is µ R2 = q R2 p R2d [1 q R1 Pr(Q R1 > )] N (1 q i ). (2) Since the average service rate of each queue depends on the state of the other, the problem of coupled queues arises. Thus, we will apply the stochastic dominance approach to bypass this difficulty. 2) MPR: In the wireless environment, the collision channel is restrictive, since we can not have more than one successful transmissions simultaneously. Thus, we also consider the MPR channel model, which is a generalized form of the packet erasure model [24]. In the MPR case, a node s transmission is successful if the SINR is above a certain threshold. More specifically, if there exists a set of T nodes transmitting in the same time slot and P rx (i, j) is the signal power received from node i at node j (when i transmits), then the SINR(i, j) determined by node j is given by P rx (i, j) SINR(i, j) = n j + k T \{i} P rx(k, j), where n j is the receiver noise power at j. We assume that a packet transmitted by i is successfully received by j if and only if SINR(i, j) γ j, where γ j is a threshold characteristic of node j. Moreover, the wireless channel is subject to fading. Let P tx (i) be the transmitting power of node i and r ij be the distance between i and j. Then, the power received by j when i transmit is P rx (i, j) = A(i, j)g(i, j), where A(i, j) is a random variable representing channel fading and under Rayleigh fading it is exponentially distributed [3]. The receiver power factor g(i, j) is given by g(i, j) = P tx (i)rij α, where α is the path loss exponent with typical values between 2 and 4. The average success probability of a packet over link ij when the transmitting nodes are in T is given by [3] ) P j i/t ( = exp γ j η j v(i, j)g(i, j) k T \{i,j} where v(i, j) is the parameter of the Rayleigh random variable for fading. ( ) v(k, j)g(k, j) γ j, v(i, j)g(i, j) Remark 1. In this work, the MPR case is considered only with simulations since the analytical expressions even for the case of one relay are rather complicated [24]. Additionally, with small values of the SINR threshold γ is more likely to have more successful simultaneous transmissions comparing to larger γ. More specifically, if γ < 1 it is possible for two or more users to transmit successfully at the same time, comparing to γ > 1 which that probability is almost zero in the considered system setup. C. Queue Stability We adopt the definition of queue stability used in [31]. Definition 1. Denote by Q t i the length of queue i at the beginning of timeslot t. The queue is said to be stable if lim P t r[qt i < x] = F (x) and lim F (x) = 1. x

6 5 If lim x lim t inf P r[q t i < x] = 1, the queue is substable. If a queue is stable, then it is also substable. If a queue is not substable, then we say it is unstable. Loynes theorem [32] states that if the arrival and service processes of a queue are strictly jointly stationary and the average arrival rate is less than the average service rate, then the queue is stable. III. ANALYSIS In this section we will present the analysis for the collision channel model. We obtain analytical equation for the arrival and the service rate of the two relays and also the stability region of the system. Additionally, we obtain the throughput per user as well as the aggregate throughput of the system. In order to proceed further we need to calculate the average arrival rates at the queues of the relays. There is an arrival at the queue of relay R 1 if both relays are silent, only one user transmits, and its transmission is successfully received by R 1 but not by the destination. When both relays receive the packet then the first will store it in its queue with probability 1 2 otherwise the second relay will store it. The probability that both relays are silent depends on the state of the queues at the relays. Both relays are silent when their queues are empty, which happens with probability Pr(Q R1 =, Q R2 = ), when the i relay has a non-empty queue but the queue at the j i relay is empty then the probability that both relays are silent is (1 q Ri )Pr(Q Ri >, Q Rj = ). The probability that both relays are silent when their queues are not empty is (1 q R1 )(1 q R2 )Pr(Q R1 >, Q R2 > ). The average arrival rate at the first relay, λ R1, is λ R1 = [Pr(Q R1 =, Q R2 = ) + (1 q R1 )Pr(Q R1 >, Q R2 = ) + (1 q R2 )Pr(Q R1 =, Q R2 > )+ N [ +(1 q R1 )(1 q R2 )Pr(Q R1 >, Q R2 > )] q i p ir1 (1 p id ) (1 p ir2 ) + 1 ] 2 p N ir 2 (1 q j ), (3) which after simple manipulation becomes j=1,j i λ R1 = [1 q R2 Pr(Q R2 > ) q R1 Pr(Q R1 > ) q R1 q R2 Pr(Q R1 >, Q R2 > )] N [ q i p ir1 (1 p id ) (1 p ir2 ) + 1 ] 2 p N ir 2 (1 q j ). Symmetrically, we have that the arrival rate at the second relay, λ R2, is j=1,j i λ R2 = [1 q R1 Pr(Q R1 > ) q R2 Pr(Q R2 > ) q R1 q R2 Pr(Q R1 >, Q R2 > )] N [ q i p ir2 (1 p id ) (1 p ir1 ) + 1 ] 2 p N ir 1 (1 q j ). j=1,j i With the previous expressions for λ R1 and λ R2 we cannot proceed further, since each rate depends on the joint probability density function of the queues. This is a well known non-tractable problem, and in order to bypass this difficulty we will deploy the stochastic dominance technique [28] in order to decouple the queues. The stochastic dominance technique was initially developed to overcome the intractability arising in the analysis of the inseparable multidimensional Markov chain for finite-user buffered slotted ALOHA 2. A. Computation of Arrival and Service Rate The stochastic dominance approach implies the construction of two hypothetical dominant systems. In the first system, say S 1, the relay R 1 reverts to the transmission of dummy packets with the same probability, when its queue is empty. All the other characteristics and assumptions of the original system remain exactly the same. Similarly, in the second system S 2 the relay R 2 reverts to the transmission of dummy packets with the same probability, when its queue is empty. 2 The stochastic dominance technique was introduced in [28] however, a brief introduction can be found in [33]. (4) (5)

7 6 Fig. 2: The Discrete Time Markov Chain model of the queue at the relay R 2 for the first dominant system S 1. 1) Dominant system S 1 Relay R 1 transmits dummy packets : In the first dominant system, the relay R 1 transmits dummy packets when its queue is empty, thus Pr(Q R1 and λ R2 are > ) = 1. The average arrival rates λ R1 λ R1 = (1 q R1 ) [1 q R2 Pr(Q R2 > )] λ R2 = (1 q R1 ) [1 q R2 Pr(Q R2 > )] The service rate of the relay R 2 in the system S 1 is given by N N [ q i p ir1 (1 p id ) (1 p ir2 ) + 1 ] 2 p N ir 2 j=1,j i [ q i p ir2 (1 p id ) (1 p ir1 ) + 1 ] 2 p N ir 1 µ R2 = q R2 p R2d(1 q R1 ) j=1,j i (1 q j ) (6) (1 q j ). (7) N (1 q i ), (8) and µ R1 is given by (1). The probability that the queue at the R 2 is not empty is Pr(Q R2 > ) = λr 2 µ R2 which can be obtained from Little s law. However, since the average arrival rate for the second relay, λ R2, depends on the Pr(Q R2 > ) we cannot directly apply the previous expression. Furthermore, λ R1 and the service rate µ R1 depend on the state of the queue of the second relay. Thus, we follow the procedure described in [19]. We model the queue at the R 2 as a Discrete Time Markov Chain (DTMC) with infinite states in order to describe the queue evolution. The DTMC is depicted in Fig. 2. The arrival rate of relay R 2 depends on whether its queue is empty or not. If the queue is empty the arrival rate is denoted by λ R2, and by λ R2,1 if it is not. Thus, the average arrival rate λ R2 can be expressed also as λ R2 = Pr(Q R2 = )λ R2, + Pr(Q R2 > )λ R2,1. (9) If the queue at the relay R 2 is empty then, we can easily show that the probability of arrival λ R2, is λ R2, = (1 q R1 ) N q i p ir2 (1 p id )[(1 p ir1 ) p ir 1 ] If the queue is not empty then the arrival rate is N j=1,j i (1 q j ). (1) λ R2,1 = (1 q R2 )λ R2,. (11) By following the same methodology as in [19] and applying the method of balance equations, we can compute the stationary distribution of the states i. The stationary distribution of the Markov Chain exists if and only if λ R2,1 < µ R2. Thus, the probability that the queue at the R 2 is empty is given by From (1), (11), (12) and (9) we obtain Pr(Q R2 = ) = µ R2 λ R2,1. (12) µ R2 λ R2,1 + λ R2, λ R2 = µ R2 λ R2,. (13) µ R2 λ R2,1 + λ R2,

8 7 Combining (9), (1), (11) and (13) we obtain the expression of the arrival rate λ R2, shown in (14), from which we see that λ R2 does not depend on q R2, the probability of transmission of R 2. λ R2 = p N R 2d (1 q i)[ N q ip ir2 (1 p id )(1 q R1 ) N j=1,j i (1 q j)[(1 p ir1 ) p ir 1 )] p N R2d (1 q i) + N q ip ir2 (1 p id ) N j=1,j i (1 q j)[(1 p ir1 ) p. (14) ir 1 ] 2) Dominant system S 2 Relay R 2 transmits dummy packets : By following exactly the same procedure as in system S 1, we obtain the expressions for µ R1, λ R1, µ R2 and λ R2. B. Necessary and Sufficient Stability Conditions The stability region of the system is defined as the set of arrival rate vectors (λ R1, λ R2 ) for which the queues in the system are stable. In order to derive the stability region we need to characterize the average arrival rates λ R1 and λ R2 as well as the average service rates µ R1 and µ R2. A tool to obtain stability condition for a queue is the Loyne s criterion [32], which states that if the arrival rate is less than the service rate then the queue is stable. The average service rates are given by (1) and (2) thus the service rate of each queue depends on the state of the other, thus we cannot apply the Loyne s criterion directly. We will apply the stochastic dominance technique, which was presented in the previous subsection for decoupling the queues and to obtain necessary and sufficient conditions for the stability. Recall that there are two dominant systems S 1 and S 2. In S i where in the relay R i transmits dummy packets when its queue is empty and all the other assumptions remain unaltered. Note that the expressions for the average arrival and service rates change from one dominant system to another since they depend on the probability that a queue is empty. In the first dominant system S 1, we have that the queues are stable if λ R1 < µ R1 and λ R2 < µ R2. The expression for the service rate µ R2 is given by (8) and the service rate µ R1 by (1). Thus, using Little s law we obtain that Pr(Q R2 > ) = After replacing (15) into (1) we obtain that ( µ R1 = q R1 p R1d λ R2 q R2 p R2d(1 q R1 ) N (1 q i). (15) 1 q R2 λ R2 q R2 p R2d(1 q R1 ) N (1 q i) ) N (1 q i ). (16) Now we can apply Loyne s criterion for both queues and obtain the region R 1 from the first dominant system which is given by { ( ) λ R2 N R 1 = (λ R1, λ R2 ) : λ R1 < q R1 p R1d 1 q R2 q R2 p R2d(1 q R1 ) N (1 q (1 q i ), i) } N λ R2 < q R2 p R2d(1 q R1 ) (1 q i ). (17) From the above condition and after using (6), (7) and (14) we can further obtain the expression for the transmission probability, q R1 where N q R1 > q R1,min q R1 > q ip ir1 (1 p id ) N j=1,j i (1 q j) [ (1 p ir2 ) p ] ir 2 N q ip ir1 (1 p id ) N j=1,j i (1 q j)[(1 p ir2 ) p ir 2 ] + p N R1d (1 q i). (18) So, the q R1,min for which the queue is stable is given by N q R1,min = q ip ir1 (1 p id ) N j=1,j i (1 q j)[(1 p ir2 ) p ir 2 ] N q ip ir1 (1 p id ) N j=1,j i (1 q j)[(1 p ir2 ) p ir 2 ] + p N R1d (1 q i). (19)

9 8 R 2 NY q R2 p R2d (1 q i ) NY q R2 p R2d(1 q R1 ) (1 q i ) NY q R1 p R1d (1 q i ) NY q R1 p R1d(1 q R2 ) (1 q i ) R 1 Fig. 3: The stability region, R, of the system. The boundaries of the region are given by (17) and (2). From the second dominant system, S 2, symmetrically we obtain the stability region R 2. { ( ) λ R1 N R 2 = (λ R1, λ R2 ) : λ R2 < q R2 p R2d 1 q R1 q R1 p R1d(1 q R2 ) N (1 q (1 q i ), i) } N λ R1 < q R1 p R1d(1 q R2 ) (1 q i ). (2) Following exactly the same procedure as in S 1 we obtain expressions and bounds for q R2, and q R2,min similar to (18) and (19) respectively with R 1 and R 2 interchanged. Similarly to system S 1, we observe that q R2 does not depend on q R1. The queue of the relay R 2 is stable if q R2 satisfies the inequality q R2,min < q R2 < 1. (21) Finally the stability region of the system, R, is R = R 1 R 2 and is shown in Fig. 3. It is interesting to note that in [28], the stability conditions obtained by the dominant systems are not merely sufficient, but sufficient and necessary for the stability of the original system. The proof relies on the indistinguishability argument which also applies in our case. By considering the properties of the dominant system S 1, we can see that the queue sizes of the two relays cannot be smaller than those in the original system, provided the queues start with identical initial conditions in both systems. By Loynes Theorem, the stability condition of a queue is given by λ < µ. Therefore, given that λ R2 < µ R2, if for some λ R1 the queue R 1 in the dominant system S 1 is stable, then the queue is also stable in the original system. Conversely, if for some λ R1 in the dominant system S 1 the queue R 1 is unstable, then it will not transmit any dummy packets and as long as the queue does not empty, the dominant and the original systems behave identically and as a consequence, the queue is unstable in the original system as well. C. Throughput Per User In this part, we will give the expression for the average user throughput, which is the average rate of packets departing from each user. There is a departure of a packet from a node if it transmits whereas the two relays and all the other users are silent, and its transmission is either successfully received by the destination or if unsuccessful,

10 9 it is successfully received by R 1 or R 2. Thus, the throughput rate µ i seen by the user i is µ i = q i [p id + (1 p id )(p ir1 + p ir2 p ir1 p ir2 )] [Pr(Q R1 =, Q R2 = ) + (1 q R1 )Pr(Q R1 >, Q R2 = )+ N +(1 q R2 )Pr(Q R1 =, Q R2 > ) + (1 q R1 )(1 q R2 )Pr(Q R1 >, Q R2 > )] (1 q j ), which, after some simplifications is given by j=1,j i µ i = q i [p id + (1 p id )(p ir1 + p ir2 p ir1 p ir2 )] N [1 q R2 Pr(Q R2 > ) q R1 Pr(Q R1 > ) q R1 q R2 Pr(Q R1 >, Q R2 > )] (1 q j ). j=1,j i We observe that the throughput per user depends on whether both queues are empty or not. So, it is not tractable to find an explicit expression of the throughput per user in closed form. Instead, we will find an upper and a lower bound and by simulation we will study the tightness of these bounds. In order to find an upper bound, we will consider the case when the two relays do not interfere with the users. This provides an upper bound because if the relays do not interfere with the users, the interference in the system is less and thus we get higher throughput per user. This is the case when we assume that the relays operate in a different channel than the users. This upper bound is given by µ i,upper = q i [p id + (1 p id )(p ir1 + p ir2 p ir1 p ir2 )] N j=1,j i (22) (23) (1 q j ). (24) In order to find a lower bound, we will assume that the two relays have always packets in their queues, their queues never empty. This can be the case when the relays are highly utilized. The lower bound is given by µ i,lower = µ i,upper (1 q R1 )(1 q R2 ). (25) However, the way we treated the relays so far, that can be reached from any user, can be sub-optimal thus, in the following subsection we consider the case of using one relay per cluster of users. D. Improving the Throughput Per User by Clustering Users In order to improve the throughput per user of the system, we consider the case that we divide the users into two clusters served by relays R 1 and R 2. We assume that due to the distance between clusters the users of the first cluster do not interfere with the users of the second cluster at their relay. If two users transmit simultaneously we will have a collision at the destination. We also assume that when a relay transmits simultaneously with the users, the users transmissions do not affect the relay s transmission to the destination node whereas their transmissions to the destination fail. That is because of the shorter distance between the relay and the destination and also the higher transmit power of the relay compared to that of the users. Furthermore, when both relays transmit simultaneously we have a collision at the destination. We divide the users equally to both clusters and we assume that each cluster has N k users with k = 1, 2 where N 1 = N 2 = N 2. The throughput per user of the system described depends again on whether both queues are empty or not. Thus, we find an upper and a lower bound and we will show that the results of the simulation of that system lie between those two bounds. The upper bound of the throughput per user i of cluster k is given by: µ i,k,upper = q i p id N j=1,j i The lower bound for the throughput is given by N k (1 q j ) + q i (1 p id )p irk (1 q j ). (26) µ i,k,lower = µ i,k,upper (1 q R1 )(1 q R2 ). (27) j=1

11 1.4.3 λ R2.2 N=2 N=4.1 N= λ R1 Fig. 4: The stability region of the system described in Table I for N = 2, 4, 8 users. Remark 2. As presented earlier, the throughput per user is given by (23). In order to obtain the inner bounds given by (25) and (27) we did the assumption that the relays have saturated queues. These bounds become tight when the relays queues approach saturation. The outer bounds for the throughput can be obtained by assuming that the relays queues are always empty thus, the relays do not cause interference to the users transmissions. Apparently, the obtained outer bounds are tight when the queues at the relays are underutilized. IV. NUMERICAL AND SIMULATION RESULTS FOR THE COLLISION CHANNEL MODEL In this section, we present the numerical results for the per user and aggregate throughput of the system with two stable relays for the collision channel model. We directly verify (in Fig. 5) that the throughput per user for the cases of two relays lies between the upper and lower bounds given in (22)-(25). Then, we compare these two cases with the system without relay and the system with one relay. The results presented below are averages of at least 1, runs on each scenario verifying the accuracy of the analysis in the previous sections. We consider that all N users and both the relays have the same link characteristics and transmission probabilities for both the simple and the scenario with user clustering. All parameters in our testing are given in Table I. The stability region for the considered scenario for N = 2, 4, 8 users is depicted in Fig. 4. As the number of users increases we see that the boundary of the region shrinks, which is expected since the number of collisions increases in the network. A. Throughput Per User The plots of Fig. 5 present the throughput per user versus the number of users of the simple scenario described in Section III-C and the clustering scenario of Section III-D. As expected the simulations lie between the lower and the upper bounds defined in previous sections. In Fig. 5a, when the number of the users in the system increases, we see that the throughput per user tends to the lower bound. This is because the relays queues are approaching saturation as the number of users increases. In this case the lower bound becomes tight. In Fig. 5b, the throughput per user tends to the upper bound, because the relays queues tend to be empty most of the time. Thus, we have a better utilization of the system with clustering due to the reduction of concurrent transmissions per relay resulting in less collisions. Furthermore, one can observe in the simulation curves, the result of orthogonalizing user transmissions to the relays via clustering as an effective doubling of the throughput for more than 4 users. B. The Benefit of Using a Second Relay The plots of Fig. 6 present the per user and aggregate throughput versus the number of users for the cases of no relay, one relay and two relays (with and without clustering), obtained by simulation. We observe that the simple system with two relays does not offer any advantage over the system with one relay. This is expected because the

12 11 TABLE I: Parameters for the collision channel model results. Notation Explanation Value in Simple Scenario p irj, i = 1,... N, j = 1, 2 p Rjd, j = 1, 2 p id, i = 1,... N q Rj, j = 1, 2 q i, i = 1,..., N Success probability of transmission from user i to relay j Success probability of transmission from relay j to the destination Success probability of transmission from user i to the destination Probability that relay attempts to transmit in a timeslot, (if its queue is not empty) Probability that user i attempts to transmit in a timeslot p ir1 = p ir2 =.9, i = 1... N p Rjd =.9, j = 1, 2 p id =.25 q R1 = q R2 =.85 q i =.25, i = 1,..., N Value in Clustering Scenario p ir1 = p jr2 =.9, i = 1... N 1, j = 1... N 2 insertion of a second relay with high probability to attempt transmission, when its queue is not empty, generates more interference in the system. However, this interference is alleviated in the clustering scenario which thus offers significant advantage over the system with one relay (more than 3% higher aggregate throughput in our specific setup). C. Average Per Packet Delay Another important parameter in cooperative systems is the average delay per packet. By delay we refer to the time it takes from the moment a packet has been transmitted until it is delivered to the destination. This parameter is important especially in delay-sensitive networks for real-time services. Thus, here we investigate the average delay per packet of systems with two relays and compare it with the systems with one and no relay. Fig. 7 presents the average delay per packet (counted in timeslots) versus the number of users for the cases of no relay, one relay and two relays (with and without clustering), obtained by simulation. The clustered system with two relays provides the lowest average delay compared to the other systems. Furthermore, the clustered systems appears to be more prone to the increase of the number of the users. Above eight users, the no relay system faces lower average delay than the one and the simple two-relay systems. The reason is that the system without relay does not suffer from additional delays introduced by packets queueing at the relay; this queueing delay increases with the number of users affecting the average per packet delay. A. The Performance Benefits of Using a Second Relay V. SIMULATION RESULTS FOR THE MPR MODEL Here we present the aggregate and throughput per user for the cases with no relay, one relay, and two relays in the system for the system with MPR, under different values of an assumed SINR threshold γ. We examine two strategies to handle a user s packet successfully received at both relays: either that (a) both relays will store and forward it to the destination (Simple) or that (b) the packet is stored by the relay which has the smaller queue size (Smaller Queue Stores Packet). If the queue size of the two relays is equal, then the two relays choose randomly and with equal probability which one will store the packet in its queue. Furthermore, as we previously did for the collision channel model we also study the potential impact of dividing the users into two clusters served by relays R 1 and R 2. An example topology of a two-relay test network with N collocated users is depicted in Fig. 8. The parameters used in the simulations for each of the three cases are shown in Table II. To simplify the presentation, we consider that all users have the same transmission probabilities and all links to have the same SINR threshold γ. Note that,

13 Lower bound Upper bound Simulated Throughput Per User (a) Simple Scenario.25.2 Lower bound Upper bound Simulated Throughput Per User (b) Clustering Scenario Fig. 5: Throughput per user vs. the number of users. with small values of γ it is more likely to have more successful simultaneous transmissions comparing to larger γ. For γ < 1 the probability for two or more nodes to transmit successfully at the same time is higher than the same probability when γ > 1, which tends to zero [24]. We note the assumptions made in our simulations. First, that the path loss exponent between users-destination as well as between the two relays is 4 while between users-relays and relays-destination is taken to be 2. This so that the relay nodes are more accessible for the users than the destination node. Thus we consider user-relay and user-destination channels that are more reliable than the user-destination one. Otherwise, the presence of the relays would degrade the performance of the network [24]. We also assume that the transmit power of the relays is five times higher than that of the users. For the Smaller Queue Stores Packet strategy, we assume that the relays communicate in a separate channel and thus these transmissions do not interfere with those of the system we study. For the clustering scenario, we divide the users equally to both clusters and assume that relay R 1 cannot receive packets from users of cluster 2 and relay R 2 cannot receive packets from users of cluster 1 respectively, this is achieved by first taking the respective path loss exponents to be equal to 4 and the distance between cluster 1 and relay R 2 to be 1.5 times the distance between cluster 1 and relay R 1, and vice-versa. For a low SINR threshold value (γ =.2), the aggregate throughput (Fig. 9a) and the throughput per user (Fig. 1a) obtained from the system with two relays are consistently, albeit slightly, higher compared to that of one relay.

14 Throughput per User (a) Throughput per user Aggregate Throughput (b) Aggregate throughput Fig. 6: Comparisons of throughput vs. number of users, with the Simple and Clustering Scenarios, against one relay and no relay. For the aggregate throughput, this gain increases as more users are inserted in the system. However, it is noteworthy that without relays, the system outperforms those with relay(s) regardless of clustering or forwarding strategy, for 8 users and up to a little over 45 users. For more than that, the performance (always in terms of aggregate and throughput per user) by the system with two relays is higher compared to the system with no relay and increases as more users are inserted in the system. Enabling clustering of users in the two relays starts providing clear benefits over 3 users, by an approximate 15%. Unlike the limited performance gains observed under γ =.2 with the higher SINR thresholds (Figs. 9b and 1b for γ = 1.2, and 9c and 1c for γ = 2.5) we observe that the system with two relays offers significant advantage compared to the networks without or with one relay. This is expected since for higher values of γ the relays, having better channel conditions than the destination, receive a larger percentage of the transmitted packets in their queues to forward to the destination. Regarding the forwarding strategy (be it Simple or the Smaller Queue Stores Packet ), across the threshold value there is a common trend that for a few users (less than 1 in low γ, while less than almost 2 in higher γ values) the latter strategy outperforms the simple one. Furthermore, with two relays and clustering, in higher SINR thresholds significant advantages are observed, for over about 1 users. This is again expected because in each cluster the users interfere with only half the users of the system in to successfully reach

15 14 6 Average Delay per Packet (in timeslots) Relays - Simple 2 Relays - Clustering Fig. 7: Comparison of average per packet delay (in timeslots) vs. number of users, with Simple and Clustering scenarios, against one relay and no relay. Fig. 8: Two relay nodes with N users with same link characteristics and transmission probabilities. the corresponding relay (the interference caused in each cluster s relay, by the users of the other cluster is almost negligible due to the distance and channel properties). Note that, the behavior trends across the four relaying schemes remains stable above γ = 1.2, in both aggregate throughput and throughput per user. With this in mind, taking a system design perspective, one can finally point out that given the link characteristics and the transmission probabilities, all relaying schemes reach a maximum aggregate throughput, thus depending on the number a system is expected to serve, the network designer can deploy the most appropriate relaying scheme. B. Average Queue Size In cooperative systems with relays, a key parameter to be taken into account is the queue size of the relays. It is important not only to keep the queues of the relays stable but also to keep their sizes as low as possible to limit delays. The plots of Fig. 11 present the average queue size (in packets) versus the number of users for the systems with one and two relays studied in previous sections for γ =.2 up to γ = 2.5. For the systems with two relays only the average queue size of the one relay is presented (the average queue size of the second is almost equal because we assume that we have symmetric users in the systems). The plots in the figure show that the average queue size of the clustered system is higher compared to the other systems for a number of users that reduces with the increase of the threshold γ. This is expected because as each

16 15 TABLE II: Simulation parameters for the MPR model results. Notation Explanation Value r d users-destination distance 1m r R users-relays distance 59m r R clustered user-non-serving relay 88m distance r d relays-destination distance 59m r inter-relay distance 6m α id users-destination path loss exponent 4 α i users-relays path loss exponent 2 α d relays-destination path loss exponent 2 P tx (i), i = 1... N Transmit power of user i 1mW P tx (R j ), j = 1, 2 Transmit power of each relay 5mW q i, i = 1... N Probability that user i attempts q i =.25, i = q Rj, j = 1, 2 to transmit in a timeslot Probability that relay j attempts to transmit in each timeslot (if its queue is not empty) 1... N q R1 = q R2 =.85 relay serves half the users of the system, the interference between them in the corresponding relay is lower and more simultaneous transmissions to a relay may be successful in a time slot. In that way, the two relays receive more packets resulting in higher queue sizes. It is interesting though to note that the maximum average queue size of the system is below one packet, for the two higher threshold values (about.65 packets for γ = 1.2 and.6 for γ = 2.5). Moreover, in these cases the average queue sizes of the other three systems tend to become equal with over 25 users. C. Average per Packet Delay Fig. 12 presents the average delay per packet (counted in timeslots) versus the number of users, for γ =.2 up to γ = 2.5 for the five relaying cases presented in the previous sections. As expected, with more users inserting packets into the system, the average delay per packet increases due to the increased interference. Figs. 12b and 12c show that the systems with two relays provide less average delay, compared to the systems with one and no relay, when the number of users is larger than 1. Specifically, for 3 users and γ = 1.2 in Fig. 12b, the clustered system offers the lowest average delay per packet and it is interesting to note that whereas its value increases as the number of users also increases, it does not exceed 5 timeslots, while for the two other cases with two relays its value is about 15 timeslots and for the one relay 24 timeslots and for no relay 9 timeslots. We can make similar observations from Fig. 12c. Furthermore, the average delay per packet for all the cases except the clustered one increases excessively, for more than 3 users when γ = 1.2 and 25 users when γ = 2.5 respectively. Also, due to the fact that the aggregate throughput is fairly low and tends to zero as the number of users tend to 5 (see Figs. 9b and 9c), there are not enough samples in order to make an accurate calculation of the average delay per packet. However, the simulation showed that the average delay per packet obtained from the clustered system for 5 users and γ = 1.2 is no more than 16 timeslots and for 5 users and γ = 2.5 it is no more than 46 timeslots. VI. CONCLUSIONS In this paper, we examined the potential gains of utilizing two relay nodes to aid the communication of a number of users to a common destination by re-transmitting (when necessary) their packets. Under the classic collision channel model we obtained analytical expressions for the arrival and service rates of the queues of the two relays and

17 16 Aggregate Throughput Relays Smaller Queue Stores Packet (a) γ =.2 Aggregate Throughput Relays Smaller Queue Stores Packet (b) γ = 1.2 Aggregate Throughput Relays Smaller Queue Stores Packet (c) γ = 2.5 Fig. 9: Aggregate throughput (in packets per slot) vs. the number of users, for different SINR threshold γ values. also the stability conditions. We further showed that the two relays are free to choose their transmission probabilities independently from each other, provided that these are greater from some minimum values which guarantee the stability of their queues. Employing multi-packet reception made the system intractable, so we conducted a thorough simulation study. Under both models, we presented a user clustering scenario where the users are divided into two groups, each served by one relay and studied the impact of clustering on the per user and aggregate throughput. Although the insertion of a second relay in a system generally does not offer significantly higher throughput per user in comparison to a system with one relay, the clustered system offers impressive performance gains, in terms of throughput, for large numbers of served users. Furthermore under the MPR model, we presented two relaying strategies: a simple one, where if both relays receive the same packet they both store it and forward it to the destination, and the Smaller Queue Stores Packet, in which the relay with the smaller queue becomes responsible for forwarding it to the destination. The second strategy offers higher aggregate and throughput per user compared to the first, for limited numbers of users. These results could be used, for example in cellular and sensor networks, to identify the number of required relays to be deployed and allocate the users among relays. Future extensions of this work can include users with nonsaturated queues (i.e. users-sources with external random arrivals) and relays with their own packets and priorities for the users. Other interesting extensions consist of relays which are capable of transmitting and receiving at the same time and the investigation of energy consumption in the total network and in particular at the relay nodes.

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2593 On the Throughput, Capacity, and Stability Regions of Random Multiple Access Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow,

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 55, NO 5, MAY 2007 1911 Game Theoretic Cross-Layer Transmission Policies in Multipacket Reception Wireless Networks Minh Hanh Ngo, Student Member, IEEE, and

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding

Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding Antonio Capone, Stefano Gualandi and Di Yuan Linköping University Post Print

More information

Understanding the Impact of Interference on Collaborative Relays

Understanding the Impact of Interference on Collaborative Relays IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract

More information

2816 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY Nikola Zlatanov, Student Member, IEEE, and Robert Schober, Fellow, IEEE

2816 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY Nikola Zlatanov, Student Member, IEEE, and Robert Schober, Fellow, IEEE 2816 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 Buffer-Aided Relaying With Adaptive Link Selection Fixed Mixed Rate Transmission Nikola Zlatanov, Student Member, IEEE, Robert Schober,

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Collaborative Multiple-Access Protocols for Wireless Networks

Collaborative Multiple-Access Protocols for Wireless Networks Collaborative Multiple-Access Protocols for Wireless Networks Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute for Systems Research

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., JANUARY 206 Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks Shijun Lin, Member, IEEE, Liqun Fu, Member, IEEE, Jianmin Xie,

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

QoS-Constrained Energy Efficiency of Cooperative ARQ in Multiple DF Relay Systems

QoS-Constrained Energy Efficiency of Cooperative ARQ in Multiple DF Relay Systems 1 QoS-Constrained Energy Efficiency of Cooperative ARQ in Multiple DF Relay Systems Yulin Hu, Student Member, IEEE, James Gross, Member, IEEE and Anke Schmeink, Member, IEEE Abstract In this paper, we

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements

An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements 1110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements Tara Javidi, Member,

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Impact of Source Counter on Routing Performance in Resource Constrained DTNs Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

A Distributed Throughput-Optimal CSMA/CA

A Distributed Throughput-Optimal CSMA/CA A Distributed Throughput-Optimal CSMA/CA Tae Hyun im, Jian Ni and Nitin H. Vaidya Technical Report, March 16, 2010. Coordinated Science Laboratory Dept. Electrical and Computer Engineering in the University

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

Throughput Maximization for Energy Efficient Multi-Node Communications using Actor-Critic Approach

Throughput Maximization for Energy Efficient Multi-Node Communications using Actor-Critic Approach Throughput Maximization for Energy Efficient Multi-Node Communications using Actor-Critic Approach Charles Pandana and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff

6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff 6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER 2011 Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff Mohamed Abouelseoud, Student Member, IEEE, and Aria Nosratinia,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Distributed power control in asymmetric interference-limited networks

Distributed power control in asymmetric interference-limited networks Distributed power control in asymmetric interference-limited networks Aakanksha Chowdhery CS229 Project Report E-mail: achowdhe@stanford.edu I. INTRODUCTION Power control in wireless communication networks

More information

Capacity Regions for Wireless Ad Hoc Networks

Capacity Regions for Wireless Ad Hoc Networks 736 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 4, JULY 2003 Capacity Regions for Wireless Ad Hoc Networks Stavros Toumpis, Student Member, IEEE and Andrea J. Goldsmith, Senior Member, IEEE

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

Wireless Multicast: Theory and Approaches

Wireless Multicast: Theory and Approaches University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2005 Wireless Multicast: Theory Approaches Prasanna Chaporkar University of Pennsylvania

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Powered by TCPDF (www.tcpdf.org) This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Nomikos, Nikolaos; Charalambous,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets

Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets 1 Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets Zhili Guo, Student Member, IEEE, Yao Wang, Fellow, IEEE, Elza Erkip, Fellow, IEEE, Shivendra Panwar, Fellow, IEEE,

More information

Optimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space

Optimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering March 23 Optimum Scheduling and Memory Management in Input Queued Switches with Finite

More information

Design and Simulation of an Underwater Acoustic Local Area Network

Design and Simulation of an Underwater Acoustic Local Area Network Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

SAPHYRE. Contract No. FP7-ICT Network protocol design for resource sharing D4.2

SAPHYRE. Contract No. FP7-ICT Network protocol design for resource sharing D4.2 SAPHYRE SAPHYRE Contract No. FP7-ICT-248001 Network protocol design for resource sharing D4.2 Contractual date: M30 Actual date: M30 Authors: Federico Librino, Leonardo Badia, Participants: CFR Work package:

More information

THE capabilities of mobile cellular communications may

THE capabilities of mobile cellular communications may 680 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 4, APRIL 2006 Analysis and Modeling of Upstream Throughput in Multihop Packet CDMA Cellular Networks Ali Nabi Zadeh, Member, IEEE, and Bijan Jabbari,

More information

Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning

Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning TO APPEAR IN IEEE/ACM TRANSACTIONS ON NETWORKING, 2008 1 Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning Andrew Brzezinski, Gil Zussman Senior Member, IEEE, and Eytan

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks

IEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks IEEE/ACM TRANSACTIONS ON NETWORKING 1 On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member, IEEE Abstract This paper

More information

OFFERING well-documented countermeasures against

OFFERING well-documented countermeasures against 732 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY 2007 Achieving Wireline Random Access Throughput in Wireless Networking Via User Cooperation Alejandro Ribeiro, Student Member, IEEE,

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE

Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE Pasi Lassila (joint work with Samuli Aalto, Abdulfetah Khalid and Prajwal Osti) COMNET Department Aalto University, School of Electrical

More information

Flexible Servers in Understaffed Tandem Lines

Flexible Servers in Understaffed Tandem Lines Flexible Servers in Understaffed Tandem Lines Abstract We study the dynamic assignment of cross-trained servers to stations in understaffed lines with finite buffers. Our objective is to maximize the production

More information

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Joan S. Pujol Roig Imperial College London jp5215@imperial.ac.uk Filippo Tosato Toshiba Research Europe filippo.tosato@toshiba-trel.com

More information

Longest edge routing on the spatial Aloha graph

Longest edge routing on the spatial Aloha graph 1 Longest edge routing on the spatial Aloha graph Steven Weber, Nihar Jindal, Radha Krishna Ganti, Martin Haenggi Drexel University, Dept. of ECE, Philadelphia, PA 1914 University of Minnesota, Dept. of

More information

THERE are a number of fundamental optimization problems

THERE are a number of fundamental optimization problems IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 1359 Modeling and Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Networks Ritesh Madan, Member, IEEE, Shuguang

More information

Uncoordinated Multiple Access for Vehicular Networks

Uncoordinated Multiple Access for Vehicular Networks Uncoordinated Multiple Access for Vehicular Networks Mikhail Ivanov, Fredrik Brännström, Alexandre Graell i Amat, Petar Popovski Chalmers University of Technology, Gothenburg, Sweden Aalborg University,

More information

TSIN01 Information Networks Lecture 8

TSIN01 Information Networks Lecture 8 TSIN01 Information Networks Lecture 8 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 24 th, 2018 Danyo Danev TSIN01 Information

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

arxiv: v1 [cs.ni] 8 Aug 2013

arxiv: v1 [cs.ni] 8 Aug 2013 Evolution of IEEE 8. compatible standards and impact on Energy Consumption arxiv:8.96v [cs.ni] 8 Aug ABSTRACT Stratos Keranidis, Giannis Kazdaridis, Nikos Makris, Thanasis Korakis, Iordanis Koutsopoulos

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

THE preceding chapters were all devoted to the analysis of images and signals which

THE preceding chapters were all devoted to the analysis of images and signals which Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to

More information

THE INCREASING popularity of wireless networks

THE INCREASING popularity of wireless networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 2, MARCH 2004 627 Accurate Analysis of TCP on Channels With Memory and Finite Round-Trip Delay Michele Rossi, Member, IEEE, Raffaella Vicenzi,

More information

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

On the Achievable Diversity-Multiplexing Tradeoff in Half Duplex Cooperative Channels

On the Achievable Diversity-Multiplexing Tradeoff in Half Duplex Cooperative Channels On the Achievable Diversity-Multiplexing Tradeoff in Half Duplex Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept. of Electrical Engineering, The Ohio State University Columbus,

More information

Energy Efficiency Maximization for Wireless Sensor Networks

Energy Efficiency Maximization for Wireless Sensor Networks Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature

More information

Analysis of Energy-Efficient, Fair Routing in Wireless Sensor Networks through Non-linear Optimization

Analysis of Energy-Efficient, Fair Routing in Wireless Sensor Networks through Non-linear Optimization Analysis of Energy-Efficient, Fair Routing in Wireless Sensor Networks through Non-linear Optimization Bhaskar Krishnamachari Electrical Engineering-Systems University of Southern California Los Angeles,

More information